Sciweavers

4189 search results - page 626 / 838
» On the Security of Wireless Sensor Networks
Sort
View
BIOWIRE
2007
Springer
15 years 5 months ago
Field-Based Coordination for Pervasive Computing Applications
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli
IPSN
2005
Springer
15 years 4 months ago
The effects of ranging noise on multihop localization: an empirical study
—This paper presents a study of how empirical ranging characteristics affect multihop localization in wireless sensor networks. We use an objective metric to evaluate a well-esta...
Kamin Whitehouse, Chris Karlof, Alec Woo, Fred Jia...
GISCIENCE
2010
Springer
230views GIS» more  GISCIENCE 2010»
14 years 11 months ago
Detecting Change in Snapshot Sequences
Wireless sensor networks are deployed to monitor dynamic geographic phenomena, or objects, over space and time. This paper presents a new spatiotemporal data model for dynamic area...
Mingzheng Shi, Stephan Winter
109
Voted
ADHOC
2008
132views more  ADHOC 2008»
14 years 11 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
JSAC
2006
155views more  JSAC 2006»
14 years 11 months ago
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links
Network mobility introduces far more complexity than host mobility. Therefore, host mobility protocols such as Mobile IPv6 (MIPv6) need to be extended to support this new type of m...
Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shya...